authentication live man-in-the-middle attack 3-factor authentication usb tokens internet security strong authentication identity authentication security microsoft .net authentication 2-factor identity 2.0 land attack 2 factor encryption logic bombs